March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Full Access
Question # 5

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

A.

Method

B.

Object

C.

Property

D.

Attribute

Full Access
Question # 6

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Full Access
Question # 7

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Full Access
Question # 8

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Full Access
Question # 9

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Full Access
Question # 10

Which of the following is a value that uniquely identifies a database record?

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Full Access
Question # 11

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Full Access
Question # 12

To establish a theory of probable cause, one technician investigates network issues in the server room while

another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies

is being performed?

A.

QUESTION NO: the obvious.

B.

Divide and conquer.

C.

Duplicate the problem

D.

Research the knowledge base.

Full Access
Question # 13

A user logs into a laptop using a username and complex password. This is an example of:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Full Access
Question # 14

Which of the following data types should a developer use when creating a variable to hold a postal code?

A.

Integer

B.

String

C.

Float

D.

Boolean

Full Access
Question # 15

Which of the following BEST describes the physical location of the data in the database?

A.

Table

B.

Column

C.

RAM

D.

HDD

Full Access
Question # 16

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

A.

Open

B.

WEP

C.

WPA

D.

WPA2

Full Access
Question # 17

Which of the following would MOST likely use an ARM processor?

A.

Laptop

B.

Tablet

C.

Workstation

D.

Server

Full Access
Question # 18

Given the following pseudocode:

Which of the following would be the output of the program?

A.

foohappy

B.

barsad

C.

foosad

D.

barhappy

Full Access
Question # 19

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Full Access
Question # 20

Which of the following types of memory can retain its content after a system reboot?

A.

DDR

B.

DIMM

C.

RAM

D.

ROM

Full Access
Question # 21

Which of the following would be the most cost-effective method to increase availability?

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Full Access
Question # 22

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Full Access
Question # 23

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

A.

Permission

B.

Ink cartridge

C.

USB cable

D.

Driver

Full Access
Question # 24

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.

Which of the following is the most likely cause?

A.

Firewall settings

B.

Improper switch configuration

C.

Incorrect IP address

D.

Misconfigured access point

Full Access
Question # 25

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Full Access
Question # 26

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Full Access
Question # 27

Which of the following data types should a database administrator use to store customer postal codes?

A.

Float

B.

String

C.

Boolean

D.

Integer

Full Access
Question # 28

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Full Access
Question # 29

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Full Access
Question # 30

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Full Access
Question # 31

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Full Access
Question # 32

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Full Access
Question # 33

Which of the following is a compiled language?

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Full Access
Question # 34

Which of the following does a NoSQL database use to organize data?

A.

Primary keys

B.

Schemas

C.

Keys/values

D.

Tables

Full Access
Question # 35

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Full Access
Question # 36

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Full Access
Question # 37

Which of the following is the closest to machine language?

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Full Access
Question # 38

Which of the following defines a reusable value that can be reassigned?

A.

Method

B.

Variable

C.

Constant

D.

Function

Full Access
Question # 39

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Full Access
Question # 40

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Full Access
Question # 41

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

A.

Boolean

B.

Integer

C.

Float

D.

Char

Full Access
Question # 42

Which of the following are benefits of a security awareness training program9 (Select two).

A.

Enhances overall security

B.

Provides information on how to avoid phishing

C.

Lowers the incidence of hardware failures

D.

Increases the availability of computers

E.

Advances end users' technical skills

F.

Creates IT security opportunities for end users

Full Access
Question # 43

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

A.

Integer

B.

Float

C.

Double

D.

String

Full Access
Question # 44

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

A.

Cellular

B.

Satellite

C.

Cable

D.

Fiber

Full Access
Question # 45

For which of the following is a relational database management system MOST commonly used?

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Full Access
Question # 46

Which of the following best describes when lo use an array?

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Full Access
Question # 47

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Full Access
Question # 48

Which of the following is an example of an interpreted language?

A.

C++

B.

Java

C.

Python

D.

Go

Full Access
Question # 49

Which of the following is an advantage of a fiat file?

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Full Access
Question # 50

Which of the following are the primary functions of an operating system? (Choose two.)

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Full Access
Question # 51

Which of the following language types most likely controls the way a web page looks?

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Full Access
Question # 52

Which of the following best explains the reason for password expiration?

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Full Access
Question # 53

Which of the following best practices can be used to mitigate password reuse?

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Full Access
Question # 54

Which of the following is secure?

A.

.edu

B.

FTP

C.

HTTPS

D.

.org

E.

FAT32

Full Access
Question # 55

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Full Access
Question # 56

A programmer uses DML to modify:

A.

files

B.

permissions

C.

data

D.

backups

Full Access
Question # 57

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

A.

Output

B.

Storage

C.

Input

D.

Processing

Full Access
Question # 58

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Full Access
Question # 59

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Full Access
Question # 60

Privacy expectations on a company intranet should be limited to:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Full Access
Question # 61

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Full Access
Question # 62

Which of the following is most appropriate to list on a social media site about an employer?

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Full Access
Question # 63

Which of the following would be used to send messages using the SMTP protocol?

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Full Access
Question # 64

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Full Access
Question # 65

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

A.

Array

B.

Vector

C.

List

D.

String

Full Access
Question # 66

Employee information is stored in a database. Which of the following BEST describes where all of an

employee’s information is stored?

A.

Record

B.

Report

C.

Column

D.

Procedure

Full Access
Question # 67

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Full Access
Question # 68

Which of the following statements BEST describes binary?

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Full Access
Question # 69

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

A.

Add a switch and hardwire the users' laptops.

B.

Add a network router.

C.

Replace the users' laptops with desktop computers.

D.

Add an access point for the users.

Full Access